Date
July 1, 2025, 12:10 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 17.628718] ================================================================== [ 17.628801] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x628/0x740 [ 17.628931] Read of size 1 at addr fff00000c7800773 by task kunit_try_catch/194 [ 17.628985] [ 17.629019] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.629212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.630471] Hardware name: linux,dummy-virt (DT) [ 17.630521] Call trace: [ 17.630545] show_stack+0x20/0x38 (C) [ 17.630601] dump_stack_lvl+0x8c/0xd0 [ 17.630657] print_report+0x118/0x608 [ 17.630879] kasan_report+0xdc/0x128 [ 17.630954] __asan_report_load1_noabort+0x20/0x30 [ 17.631055] ksize_unpoisons_memory+0x628/0x740 [ 17.631105] kunit_try_run_case+0x170/0x3f0 [ 17.631155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.631209] kthread+0x328/0x630 [ 17.631251] ret_from_fork+0x10/0x20 [ 17.631424] [ 17.631619] Allocated by task 194: [ 17.631653] kasan_save_stack+0x3c/0x68 [ 17.631931] kasan_save_track+0x20/0x40 [ 17.632149] kasan_save_alloc_info+0x40/0x58 [ 17.632206] __kasan_kmalloc+0xd4/0xd8 [ 17.632246] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.632287] ksize_unpoisons_memory+0xc0/0x740 [ 17.632326] kunit_try_run_case+0x170/0x3f0 [ 17.632366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.632411] kthread+0x328/0x630 [ 17.632530] ret_from_fork+0x10/0x20 [ 17.632882] [ 17.632955] The buggy address belongs to the object at fff00000c7800700 [ 17.632955] which belongs to the cache kmalloc-128 of size 128 [ 17.633048] The buggy address is located 0 bytes to the right of [ 17.633048] allocated 115-byte region [fff00000c7800700, fff00000c7800773) [ 17.633568] [ 17.633638] The buggy address belongs to the physical page: [ 17.633674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 17.633875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.633993] page_type: f5(slab) [ 17.634032] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.634084] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.634125] page dumped because: kasan: bad access detected [ 17.634155] [ 17.634335] Memory state around the buggy address: [ 17.634377] fff00000c7800600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.634429] fff00000c7800680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.634481] >fff00000c7800700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.634524] ^ [ 17.634708] fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.634872] fff00000c7800800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.635041] ================================================================== [ 17.642632] ================================================================== [ 17.642684] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x690/0x740 [ 17.642921] Read of size 1 at addr fff00000c780077f by task kunit_try_catch/194 [ 17.643141] [ 17.643198] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.643367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.643489] Hardware name: linux,dummy-virt (DT) [ 17.643580] Call trace: [ 17.643610] show_stack+0x20/0x38 (C) [ 17.643684] dump_stack_lvl+0x8c/0xd0 [ 17.643733] print_report+0x118/0x608 [ 17.643778] kasan_report+0xdc/0x128 [ 17.643993] __asan_report_load1_noabort+0x20/0x30 [ 17.644056] ksize_unpoisons_memory+0x690/0x740 [ 17.644297] kunit_try_run_case+0x170/0x3f0 [ 17.644649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.645257] kthread+0x328/0x630 [ 17.645459] ret_from_fork+0x10/0x20 [ 17.645748] [ 17.645863] Allocated by task 194: [ 17.645892] kasan_save_stack+0x3c/0x68 [ 17.645964] kasan_save_track+0x20/0x40 [ 17.646277] kasan_save_alloc_info+0x40/0x58 [ 17.646867] __kasan_kmalloc+0xd4/0xd8 [ 17.647015] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.647097] ksize_unpoisons_memory+0xc0/0x740 [ 17.647243] kunit_try_run_case+0x170/0x3f0 [ 17.647386] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.647520] kthread+0x328/0x630 [ 17.647583] ret_from_fork+0x10/0x20 [ 17.647617] [ 17.647638] The buggy address belongs to the object at fff00000c7800700 [ 17.647638] which belongs to the cache kmalloc-128 of size 128 [ 17.647697] The buggy address is located 12 bytes to the right of [ 17.647697] allocated 115-byte region [fff00000c7800700, fff00000c7800773) [ 17.648051] [ 17.648179] The buggy address belongs to the physical page: [ 17.648255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 17.648416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.648764] page_type: f5(slab) [ 17.648890] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.648978] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.649019] page dumped because: kasan: bad access detected [ 17.649365] [ 17.649471] Memory state around the buggy address: [ 17.649682] fff00000c7800600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.649801] fff00000c7800680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.650015] >fff00000c7800700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.650128] ^ [ 17.650234] fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.650279] fff00000c7800800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.650536] ================================================================== [ 17.637705] ================================================================== [ 17.637784] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x618/0x740 [ 17.637839] Read of size 1 at addr fff00000c7800778 by task kunit_try_catch/194 [ 17.637889] [ 17.637923] CPU: 1 UID: 0 PID: 194 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT [ 17.638007] Tainted: [B]=BAD_PAGE, [N]=TEST [ 17.638035] Hardware name: linux,dummy-virt (DT) [ 17.638067] Call trace: [ 17.638097] show_stack+0x20/0x38 (C) [ 17.638146] dump_stack_lvl+0x8c/0xd0 [ 17.638194] print_report+0x118/0x608 [ 17.638242] kasan_report+0xdc/0x128 [ 17.638288] __asan_report_load1_noabort+0x20/0x30 [ 17.638340] ksize_unpoisons_memory+0x618/0x740 [ 17.638389] kunit_try_run_case+0x170/0x3f0 [ 17.638442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.638509] kthread+0x328/0x630 [ 17.638550] ret_from_fork+0x10/0x20 [ 17.638596] [ 17.638615] Allocated by task 194: [ 17.638641] kasan_save_stack+0x3c/0x68 [ 17.638682] kasan_save_track+0x20/0x40 [ 17.638718] kasan_save_alloc_info+0x40/0x58 [ 17.638778] __kasan_kmalloc+0xd4/0xd8 [ 17.638816] __kmalloc_cache_noprof+0x16c/0x3c0 [ 17.638862] ksize_unpoisons_memory+0xc0/0x740 [ 17.638910] kunit_try_run_case+0x170/0x3f0 [ 17.638954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 17.639003] kthread+0x328/0x630 [ 17.639060] ret_from_fork+0x10/0x20 [ 17.639097] [ 17.639116] The buggy address belongs to the object at fff00000c7800700 [ 17.639116] which belongs to the cache kmalloc-128 of size 128 [ 17.639177] The buggy address is located 5 bytes to the right of [ 17.639177] allocated 115-byte region [fff00000c7800700, fff00000c7800773) [ 17.639245] [ 17.639264] The buggy address belongs to the physical page: [ 17.639296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107800 [ 17.639728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 17.639844] page_type: f5(slab) [ 17.639887] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000122 0000000000000000 [ 17.639941] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 17.640184] page dumped because: kasan: bad access detected [ 17.640259] [ 17.640404] Memory state around the buggy address: [ 17.640441] fff00000c7800600: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 17.640721] fff00000c7800680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.640906] >fff00000c7800700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 17.641017] ^ [ 17.641117] fff00000c7800780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.641260] fff00000c7800800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 17.641532] ==================================================================
[ 11.883468] ================================================================== [ 11.884017] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.884478] Read of size 1 at addr ffff88810312f27f by task kunit_try_catch/211 [ 11.884792] [ 11.884886] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.884925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.884936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.884955] Call Trace: [ 11.884969] <TASK> [ 11.884984] dump_stack_lvl+0x73/0xb0 [ 11.885010] print_report+0xd1/0x650 [ 11.885044] ? __virt_addr_valid+0x1db/0x2d0 [ 11.885065] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.885086] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.885107] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.885129] kasan_report+0x141/0x180 [ 11.885149] ? ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.885175] __asan_report_load1_noabort+0x18/0x20 [ 11.885197] ksize_unpoisons_memory+0x7b6/0x9b0 [ 11.885220] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.885240] ? finish_task_switch.isra.0+0x153/0x700 [ 11.885260] ? __switch_to+0x47/0xf50 [ 11.885283] ? __schedule+0x10cc/0x2b60 [ 11.885303] ? __pfx_read_tsc+0x10/0x10 [ 11.885322] ? ktime_get_ts64+0x86/0x230 [ 11.885344] kunit_try_run_case+0x1a5/0x480 [ 11.885366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.885386] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.885407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.885428] ? __kthread_parkme+0x82/0x180 [ 11.885447] ? preempt_count_sub+0x50/0x80 [ 11.885468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.885490] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.885511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.885532] kthread+0x337/0x6f0 [ 11.885550] ? trace_preempt_on+0x20/0xc0 [ 11.885571] ? __pfx_kthread+0x10/0x10 [ 11.885590] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.885609] ? calculate_sigpending+0x7b/0xa0 [ 11.885631] ? __pfx_kthread+0x10/0x10 [ 11.885651] ret_from_fork+0x116/0x1d0 [ 11.885668] ? __pfx_kthread+0x10/0x10 [ 11.885686] ret_from_fork_asm+0x1a/0x30 [ 11.885715] </TASK> [ 11.885725] [ 11.895249] Allocated by task 211: [ 11.895465] kasan_save_stack+0x45/0x70 [ 11.895702] kasan_save_track+0x18/0x40 [ 11.895916] kasan_save_alloc_info+0x3b/0x50 [ 11.896377] __kasan_kmalloc+0xb7/0xc0 [ 11.896605] __kmalloc_cache_noprof+0x189/0x420 [ 11.896833] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.897101] kunit_try_run_case+0x1a5/0x480 [ 11.897337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.897688] kthread+0x337/0x6f0 [ 11.897853] ret_from_fork+0x116/0x1d0 [ 11.898000] ret_from_fork_asm+0x1a/0x30 [ 11.898147] [ 11.898218] The buggy address belongs to the object at ffff88810312f200 [ 11.898218] which belongs to the cache kmalloc-128 of size 128 [ 11.898935] The buggy address is located 12 bytes to the right of [ 11.898935] allocated 115-byte region [ffff88810312f200, ffff88810312f273) [ 11.899628] [ 11.899704] The buggy address belongs to the physical page: [ 11.900005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f [ 11.900662] flags: 0x200000000000000(node=0|zone=2) [ 11.900933] page_type: f5(slab) [ 11.901091] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.901563] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.901946] page dumped because: kasan: bad access detected [ 11.902381] [ 11.902486] Memory state around the buggy address: [ 11.902690] ffff88810312f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.903062] ffff88810312f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.903557] >ffff88810312f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.903869] ^ [ 11.904442] ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.904683] ffff88810312f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.904992] ================================================================== [ 11.857599] ================================================================== [ 11.857925] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.858394] Read of size 1 at addr ffff88810312f278 by task kunit_try_catch/211 [ 11.858776] [ 11.858924] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.858964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.858975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.858994] Call Trace: [ 11.859007] <TASK> [ 11.859021] dump_stack_lvl+0x73/0xb0 [ 11.859189] print_report+0xd1/0x650 [ 11.859231] ? __virt_addr_valid+0x1db/0x2d0 [ 11.859264] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.859286] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.859307] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.859328] kasan_report+0x141/0x180 [ 11.859349] ? ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.859375] __asan_report_load1_noabort+0x18/0x20 [ 11.859398] ksize_unpoisons_memory+0x7e9/0x9b0 [ 11.859420] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.859441] ? finish_task_switch.isra.0+0x153/0x700 [ 11.859488] ? __switch_to+0x47/0xf50 [ 11.859511] ? __schedule+0x10cc/0x2b60 [ 11.859532] ? __pfx_read_tsc+0x10/0x10 [ 11.859562] ? ktime_get_ts64+0x86/0x230 [ 11.859584] kunit_try_run_case+0x1a5/0x480 [ 11.859634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.859655] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.859676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.859708] ? __kthread_parkme+0x82/0x180 [ 11.859727] ? preempt_count_sub+0x50/0x80 [ 11.859750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.859773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.859796] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.859818] kthread+0x337/0x6f0 [ 11.859836] ? trace_preempt_on+0x20/0xc0 [ 11.859858] ? __pfx_kthread+0x10/0x10 [ 11.859878] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.859898] ? calculate_sigpending+0x7b/0xa0 [ 11.859920] ? __pfx_kthread+0x10/0x10 [ 11.859940] ret_from_fork+0x116/0x1d0 [ 11.859957] ? __pfx_kthread+0x10/0x10 [ 11.859977] ret_from_fork_asm+0x1a/0x30 [ 11.860006] </TASK> [ 11.860017] [ 11.870567] Allocated by task 211: [ 11.870760] kasan_save_stack+0x45/0x70 [ 11.871011] kasan_save_track+0x18/0x40 [ 11.871222] kasan_save_alloc_info+0x3b/0x50 [ 11.871672] __kasan_kmalloc+0xb7/0xc0 [ 11.871905] __kmalloc_cache_noprof+0x189/0x420 [ 11.872200] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.872363] kunit_try_run_case+0x1a5/0x480 [ 11.872650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.872955] kthread+0x337/0x6f0 [ 11.873088] ret_from_fork+0x116/0x1d0 [ 11.873309] ret_from_fork_asm+0x1a/0x30 [ 11.873696] [ 11.873773] The buggy address belongs to the object at ffff88810312f200 [ 11.873773] which belongs to the cache kmalloc-128 of size 128 [ 11.874681] The buggy address is located 5 bytes to the right of [ 11.874681] allocated 115-byte region [ffff88810312f200, ffff88810312f273) [ 11.875784] [ 11.876220] The buggy address belongs to the physical page: [ 11.876465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f [ 11.876857] flags: 0x200000000000000(node=0|zone=2) [ 11.877518] page_type: f5(slab) [ 11.877676] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.878009] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.878601] page dumped because: kasan: bad access detected [ 11.878944] [ 11.879203] Memory state around the buggy address: [ 11.879723] ffff88810312f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.880002] ffff88810312f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.880519] >ffff88810312f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.881042] ^ [ 11.881509] ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.881952] ffff88810312f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.882519] ================================================================== [ 11.837567] ================================================================== [ 11.838060] BUG: KASAN: slab-out-of-bounds in ksize_unpoisons_memory+0x81c/0x9b0 [ 11.838381] Read of size 1 at addr ffff88810312f273 by task kunit_try_catch/211 [ 11.838762] [ 11.838911] CPU: 1 UID: 0 PID: 211 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc4 #1 PREEMPT(voluntary) [ 11.838969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 11.838980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 11.839001] Call Trace: [ 11.839013] <TASK> [ 11.839045] dump_stack_lvl+0x73/0xb0 [ 11.839074] print_report+0xd1/0x650 [ 11.839096] ? __virt_addr_valid+0x1db/0x2d0 [ 11.839126] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.839173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 11.839194] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.839215] kasan_report+0x141/0x180 [ 11.839236] ? ksize_unpoisons_memory+0x81c/0x9b0 [ 11.839263] __asan_report_load1_noabort+0x18/0x20 [ 11.839285] ksize_unpoisons_memory+0x81c/0x9b0 [ 11.839308] ? __pfx_ksize_unpoisons_memory+0x10/0x10 [ 11.839329] ? finish_task_switch.isra.0+0x153/0x700 [ 11.839351] ? __switch_to+0x47/0xf50 [ 11.839376] ? __schedule+0x10cc/0x2b60 [ 11.839397] ? __pfx_read_tsc+0x10/0x10 [ 11.839417] ? ktime_get_ts64+0x86/0x230 [ 11.839440] kunit_try_run_case+0x1a5/0x480 [ 11.839476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.839499] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 11.839525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 11.839557] ? __kthread_parkme+0x82/0x180 [ 11.839577] ? preempt_count_sub+0x50/0x80 [ 11.839684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 11.839713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.839748] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 11.839772] kthread+0x337/0x6f0 [ 11.839791] ? trace_preempt_on+0x20/0xc0 [ 11.839814] ? __pfx_kthread+0x10/0x10 [ 11.839833] ? _raw_spin_unlock_irq+0x47/0x80 [ 11.839853] ? calculate_sigpending+0x7b/0xa0 [ 11.839877] ? __pfx_kthread+0x10/0x10 [ 11.839897] ret_from_fork+0x116/0x1d0 [ 11.839914] ? __pfx_kthread+0x10/0x10 [ 11.839933] ret_from_fork_asm+0x1a/0x30 [ 11.839962] </TASK> [ 11.839973] [ 11.848344] Allocated by task 211: [ 11.848551] kasan_save_stack+0x45/0x70 [ 11.848757] kasan_save_track+0x18/0x40 [ 11.848914] kasan_save_alloc_info+0x3b/0x50 [ 11.849197] __kasan_kmalloc+0xb7/0xc0 [ 11.849431] __kmalloc_cache_noprof+0x189/0x420 [ 11.849664] ksize_unpoisons_memory+0xc7/0x9b0 [ 11.849816] kunit_try_run_case+0x1a5/0x480 [ 11.849976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 11.850408] kthread+0x337/0x6f0 [ 11.850586] ret_from_fork+0x116/0x1d0 [ 11.850772] ret_from_fork_asm+0x1a/0x30 [ 11.850923] [ 11.850995] The buggy address belongs to the object at ffff88810312f200 [ 11.850995] which belongs to the cache kmalloc-128 of size 128 [ 11.851714] The buggy address is located 0 bytes to the right of [ 11.851714] allocated 115-byte region [ffff88810312f200, ffff88810312f273) [ 11.852523] [ 11.852661] The buggy address belongs to the physical page: [ 11.852895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10312f [ 11.853282] flags: 0x200000000000000(node=0|zone=2) [ 11.853519] page_type: f5(slab) [ 11.853686] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000 [ 11.853954] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000 [ 11.854272] page dumped because: kasan: bad access detected [ 11.854512] [ 11.854606] Memory state around the buggy address: [ 11.854806] ffff88810312f100: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 11.855265] ffff88810312f180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.855477] >ffff88810312f200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc [ 11.855745] ^ [ 11.856323] ffff88810312f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.856693] ffff88810312f300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 11.856961] ==================================================================